3 months ago
![[Image: Screenshot-4.png]](https://i.postimg.cc/FKzxMXqT/Screenshot-4.png)
This course builds on what you have learned so far by extending your development capabilities with:
- playing with Process Environment Blocks and implementing our own function address resolution
- more advanced code injection techniques
- understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
- in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
- grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
- discussing inter process communication and how to control execution of multiple payloads
You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.COURSE IN A NUTSHELLYou Will Learn
- What is PEB and how function address resolution works
- What are other code injection techniques
- How to build custom reflective binary
- How to hook APIs in memory
- How to migrate between 32- and 64-bit processes
- How to use IPC to control your payloads
- Full-blown videos explaining all techniques in detail
- Transcription with English subtitles
- Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
- Source code with code templates for rapid development
- VM image with ready-to-use development environment
- Recommended: taking Malware Development Essentials course
- Understanding of operating system architecture
- Some experience with Windows OS
- Computer with min. 4 GB of RAM + 30 GB of free disk space
- VirtualBox 7.0+ installed
- Strong will to learn and having fun
Target Audience
- Ethical Hackers
- Penetration Testers
- Blue Teamers
- Threat Hunters
- All security engineers/professionals wanting to learn advanced offensive tactics